SlideShare a Scribd company logo
1 of 20
How to Fight Product
Counterfeiting with
Investigative Strategies and
Tactics
A Complimentary Webinar from Aurora WDC
12:00 Noon Eastern /// Wednesday 8 January 2014
~ featuring ~

Tim Stone
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Derek Johnson
Powered by
Tim Stone has more than 40 years of experience in national
intelligence, commercial business intelligence, counterintelligence,
and information security. During his career he has created highly
successful competitive intelligence programs in several
corporations.

Tim Stone

Through his work in establishing competitive intelligence programs
companies such as Motorola, Baxter Healthcare, and Home Depot,
Mr. Stone gained practical experience in supporting the exact
issues outlined within this learning framework.
Email: stonecreek2@att.net

The Intelligence Collaborative is the online learning and networking
community powered by Aurora WDC, our clients, partners and other friends
and dedicated to exploring how to apply intelligence methods to solve realworld business problems.
Apply for a free 30-day trial membership at http://IntelCollab.com or learn
more about Aurora at http://AuroraWDC.com – see you next time!
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Questions, Commentary & Content
α

α

You are welcome to tweet any comments on
Twitter where we are monitoring the
hashtag #IntelCollab or eavesdrop via
http://tweetchat.com/room/IntelCollab

α

Slides will be available after the webinar for
embedding and sharing via
http://slideshare.net/IntelCollab

α

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Use the Questions pane on your
GoToWebinar control panel and all
questions will be answered in the second
half of the hour.

To view the recording and download the PPT
file, please register for a trial membership at
http://IntelCollab.com.

Powered by
Agenda
► The Counterfeiting Problem
► The Supply Chain for Counterfeiting – Parsing the

Threat

► Useful Investigative Methods to Combat

Counterfeiting

► Case Studies – what worked & what fell short
► Summary, Q&A and Discussion
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
How Big is the Counterfeiting Problem?
► > $250 billion business globally (OECD)
► $75 billion in fraudulent medicines
► > 60% of counterfeit products sold by legitimate

companies

► FTC took action against more than 10K websites

selling counterfeit products in 2013

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
How Do Counterfeit Products Come to Market?
► Knockoffs of top product brands
► Diverted and tampered legitimate products
► Counterfeit product components
► Substitute materials made by offshore suppliers
► Many others

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Combating the Problem – Expectations of Clients
► “Make it go away”
► Don’t want to talk about “internal problems”
► Who are these people?
► Stop the supply of counterfeit product
► Prosecute the counterfeiters

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Important Aspects of Counterfeiting Investigations
► Counterfeiters can be dangerous criminals
► Local government officials can be involved
► Identification is difficult – names change frequently;

false information plentiful

► Counterfeiting supply chains are complex and often

multi-national

► Counterfeiting cases cannot be easily stopped
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
The Investigation
Key Steps

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Step 1: Parse the Threat
► Collect all available facts concerning

Prod Mfg

appearance(s) of counterfeit product
Exporter

► Identify all parties involved – “chain of custody”

Product
Synthesis

Exporter

Background checks on key outside people/orgs

Importer

► Check other markets, customers, distributors

Importer
Distributors

► Create detailed timeline for incidents

Local agent
Customers

► Synthesize supply chain for the counterfeiting
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Step 2: Assess the Sophistication
► Thorough product examination including materials

and process testing






Key materials, active ingredients
Packaging
Printing and barcoding
Anti-counterfeiting measures on product

► Assess levels of technology and manufacturing

equipment required

► Identify critical sources/suppliers of equipment and

processes needed

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Step 3: Identify the Players
► Sales, distribution, marketing, suppliers, customers

linked to counterfeit product

► Client supply chain organization
► Customs/import/export agencies
► Government agencies and officials
► Potential vendors/suppliers to counterfeiters

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Step 4: Developing a Course of Action
► Team with legal counsel to develop a plan
► Background checks on key

individuals/organizations

► Contact local law enforcement & govt agencies
► Evaluate the depth of local govt and customs data –

manifests, etc

► Determine requirement for licensed private

investigation resources

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Step 5: Obtaining Critical Evidence
► Engage with company counsel and law enforcement

authorities to identify critical needs

► Develop full profiles of key individuals -- their

business and financial affairs, contacts, pseudos,
etc.

► Verify linkages with client supply chain, equipment,

sales and distribution activities

► Primary research – who knows what?
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Case Study #1: Product Diversion
Situation: Branded pharmaceutical product appears in wrong
market, looks authentic but is it?

Investigation:
Client supply chain and customer inventories examined
Customs data collected and reviewed
Samples of diverted product collected and analyzed
Background investigation of local individuals, supply companies,

pharmacies conducted; law enforcement contacted
Counterfeit supply chain synthesized
Results supplied to company counsel

Resolution:
 Source of diverted medicines terminated
Distributor agreements strengthened
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Case Study #2: Stolen & Modified Product
Situation: Customers of company products reporting high
rates of failure; sample products contain counterfeit parts

Investigation:
Samples of product evaluated; counterfeit components verified
Sources of all components reviewed including suppliers
Client supply chain and employees investigated
Distribution network for product examined
Results supplied to company counsel & security

Resolution:
 Supplier agreements ended
Employees removed

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Case Study #3: Benchmarking Anti-Counterfeiting
Measures/Technology
Situation: How quickly are other companies adopting the new
anti-counterfeiting technology?

Investigation:
Benchmark strategies and implementation steps
Monitor standards groups
Separate claims from reality
Identify issues (costs, technical difficulties, equipment etc) that

may delay implementation
Track market entry – availability of new barcoded product
Evaluate samples

Resolution:
 Cautious strategy recommended
Enhance participation on standards bodies
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Strengthening Investigative Resources
& Techniques
► Local presence (in country) is critical – connections!
► Deep knowledge of customs and govt. databases
► Strong relations with government

officials and law enforcement

► Access to local information bases not online
► Ability to reach “trusted” and licensed investigators
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Summary
► Plan carefully before proceeding
► Engage legal counsel & review applicable laws
► Work closely with local client resources in country
► Know when to engage law enforcement
► Be careful!

The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by
Thank you!
Now how about a little Q&A?
Tim Stone

Email: stonecreek2@att.net

The Intelligence Collaborative is the online learning and networking
community powered by Aurora WDC, our clients, partners and other friends
and dedicated to exploring how to apply intelligence methods to solve realworld business problems.
Apply for a free 30-day trial membership at http://IntelCollab.com or learn
more about Aurora at http://AuroraWDC.com – see you next time!
The Intelligence Collaborative
http://IntelCollab.com #IntelCollab

Powered by

More Related Content

Similar to How to Fight Product Counterfeiting with Investigative Strategies and Tactics

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesSecureDocs
 
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Mark Goldstein
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementDr Mark Lovatt
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
OMM China IP Presentation 9-12-2013
OMM China IP Presentation 9-12-2013OMM China IP Presentation 9-12-2013
OMM China IP Presentation 9-12-2013CALSTART
 
Super data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsSuper data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsJim Kaplan CIA CFE
 
How Industry and Market Sense Making Communicates Strategic Intelligence
How Industry and Market Sense Making Communicates Strategic IntelligenceHow Industry and Market Sense Making Communicates Strategic Intelligence
How Industry and Market Sense Making Communicates Strategic IntelligenceIntelCollab.com
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology ProgrammeElton050505
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 

Similar to How to Fight Product Counterfeiting with Investigative Strategies and Tactics (20)

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
OMM China IP Presentation 9-12-2013
OMM China IP Presentation 9-12-2013OMM China IP Presentation 9-12-2013
OMM China IP Presentation 9-12-2013
 
Super data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analyticsSuper data-charging your corruption reviews with integrated analytics
Super data-charging your corruption reviews with integrated analytics
 
How Industry and Market Sense Making Communicates Strategic Intelligence
How Industry and Market Sense Making Communicates Strategic IntelligenceHow Industry and Market Sense Making Communicates Strategic Intelligence
How Industry and Market Sense Making Communicates Strategic Intelligence
 
Ipctoolkit shared by absoluteproducers
Ipctoolkit shared by absoluteproducersIpctoolkit shared by absoluteproducers
Ipctoolkit shared by absoluteproducers
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology Programme
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 

More from IntelCollab.com

How Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIHow Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIIntelCollab.com
 
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationHow Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationIntelCollab.com
 
How Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetHow Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetIntelCollab.com
 
How to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionHow to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionIntelCollab.com
 
How to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleHow to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleIntelCollab.com
 
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsHow to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsIntelCollab.com
 
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageHow Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageIntelCollab.com
 
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalHow Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalIntelCollab.com
 
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsHow Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsIntelCollab.com
 
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...IntelCollab.com
 
How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...IntelCollab.com
 
How to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassHow to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassIntelCollab.com
 
How Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityHow Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityIntelCollab.com
 
How to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesHow to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesIntelCollab.com
 
How Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageHow Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageIntelCollab.com
 
How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...IntelCollab.com
 
How to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsHow to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsIntelCollab.com
 
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceHow to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceIntelCollab.com
 
How to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessHow to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessIntelCollab.com
 
How to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyHow to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyIntelCollab.com
 

More from IntelCollab.com (20)

How Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIHow Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CI
 
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationHow Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
 
How Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetHow Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry Vet
 
How to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionHow to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence Function
 
How to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleHow to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product Lifecycle
 
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsHow to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
 
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageHow Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
 
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalHow Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
 
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsHow Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
 
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
 
How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...
 
How to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassHow to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First Class
 
How Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityHow Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business Sustainability
 
How to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesHow to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging Economies
 
How Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageHow Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive Advantage
 
How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...
 
How to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsHow to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence Topics
 
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceHow to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
 
How to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessHow to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum Success
 
How to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyHow to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence Technology
 

Recently uploaded

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 

Recently uploaded (20)

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

How to Fight Product Counterfeiting with Investigative Strategies and Tactics

  • 1. How to Fight Product Counterfeiting with Investigative Strategies and Tactics A Complimentary Webinar from Aurora WDC 12:00 Noon Eastern /// Wednesday 8 January 2014 ~ featuring ~ Tim Stone The Intelligence Collaborative http://IntelCollab.com #IntelCollab Derek Johnson Powered by
  • 2. Tim Stone has more than 40 years of experience in national intelligence, commercial business intelligence, counterintelligence, and information security. During his career he has created highly successful competitive intelligence programs in several corporations. Tim Stone Through his work in establishing competitive intelligence programs companies such as Motorola, Baxter Healthcare, and Home Depot, Mr. Stone gained practical experience in supporting the exact issues outlined within this learning framework. Email: stonecreek2@att.net The Intelligence Collaborative is the online learning and networking community powered by Aurora WDC, our clients, partners and other friends and dedicated to exploring how to apply intelligence methods to solve realworld business problems. Apply for a free 30-day trial membership at http://IntelCollab.com or learn more about Aurora at http://AuroraWDC.com – see you next time! The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 3. Questions, Commentary & Content α α You are welcome to tweet any comments on Twitter where we are monitoring the hashtag #IntelCollab or eavesdrop via http://tweetchat.com/room/IntelCollab α Slides will be available after the webinar for embedding and sharing via http://slideshare.net/IntelCollab α The Intelligence Collaborative http://IntelCollab.com #IntelCollab Use the Questions pane on your GoToWebinar control panel and all questions will be answered in the second half of the hour. To view the recording and download the PPT file, please register for a trial membership at http://IntelCollab.com. Powered by
  • 4. Agenda ► The Counterfeiting Problem ► The Supply Chain for Counterfeiting – Parsing the Threat ► Useful Investigative Methods to Combat Counterfeiting ► Case Studies – what worked & what fell short ► Summary, Q&A and Discussion The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 5. How Big is the Counterfeiting Problem? ► > $250 billion business globally (OECD) ► $75 billion in fraudulent medicines ► > 60% of counterfeit products sold by legitimate companies ► FTC took action against more than 10K websites selling counterfeit products in 2013 The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 6. How Do Counterfeit Products Come to Market? ► Knockoffs of top product brands ► Diverted and tampered legitimate products ► Counterfeit product components ► Substitute materials made by offshore suppliers ► Many others The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 7. Combating the Problem – Expectations of Clients ► “Make it go away” ► Don’t want to talk about “internal problems” ► Who are these people? ► Stop the supply of counterfeit product ► Prosecute the counterfeiters The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 8. Important Aspects of Counterfeiting Investigations ► Counterfeiters can be dangerous criminals ► Local government officials can be involved ► Identification is difficult – names change frequently; false information plentiful ► Counterfeiting supply chains are complex and often multi-national ► Counterfeiting cases cannot be easily stopped The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 9. The Investigation Key Steps The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 10. Step 1: Parse the Threat ► Collect all available facts concerning Prod Mfg appearance(s) of counterfeit product Exporter ► Identify all parties involved – “chain of custody” Product Synthesis Exporter Background checks on key outside people/orgs Importer ► Check other markets, customers, distributors Importer Distributors ► Create detailed timeline for incidents Local agent Customers ► Synthesize supply chain for the counterfeiting The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 11. Step 2: Assess the Sophistication ► Thorough product examination including materials and process testing     Key materials, active ingredients Packaging Printing and barcoding Anti-counterfeiting measures on product ► Assess levels of technology and manufacturing equipment required ► Identify critical sources/suppliers of equipment and processes needed The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 12. Step 3: Identify the Players ► Sales, distribution, marketing, suppliers, customers linked to counterfeit product ► Client supply chain organization ► Customs/import/export agencies ► Government agencies and officials ► Potential vendors/suppliers to counterfeiters The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 13. Step 4: Developing a Course of Action ► Team with legal counsel to develop a plan ► Background checks on key individuals/organizations ► Contact local law enforcement & govt agencies ► Evaluate the depth of local govt and customs data – manifests, etc ► Determine requirement for licensed private investigation resources The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 14. Step 5: Obtaining Critical Evidence ► Engage with company counsel and law enforcement authorities to identify critical needs ► Develop full profiles of key individuals -- their business and financial affairs, contacts, pseudos, etc. ► Verify linkages with client supply chain, equipment, sales and distribution activities ► Primary research – who knows what? The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 15. Case Study #1: Product Diversion Situation: Branded pharmaceutical product appears in wrong market, looks authentic but is it? Investigation: Client supply chain and customer inventories examined Customs data collected and reviewed Samples of diverted product collected and analyzed Background investigation of local individuals, supply companies, pharmacies conducted; law enforcement contacted Counterfeit supply chain synthesized Results supplied to company counsel Resolution:  Source of diverted medicines terminated Distributor agreements strengthened The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 16. Case Study #2: Stolen & Modified Product Situation: Customers of company products reporting high rates of failure; sample products contain counterfeit parts Investigation: Samples of product evaluated; counterfeit components verified Sources of all components reviewed including suppliers Client supply chain and employees investigated Distribution network for product examined Results supplied to company counsel & security Resolution:  Supplier agreements ended Employees removed The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 17. Case Study #3: Benchmarking Anti-Counterfeiting Measures/Technology Situation: How quickly are other companies adopting the new anti-counterfeiting technology? Investigation: Benchmark strategies and implementation steps Monitor standards groups Separate claims from reality Identify issues (costs, technical difficulties, equipment etc) that may delay implementation Track market entry – availability of new barcoded product Evaluate samples Resolution:  Cautious strategy recommended Enhance participation on standards bodies The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 18. Strengthening Investigative Resources & Techniques ► Local presence (in country) is critical – connections! ► Deep knowledge of customs and govt. databases ► Strong relations with government officials and law enforcement ► Access to local information bases not online ► Ability to reach “trusted” and licensed investigators The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 19. Summary ► Plan carefully before proceeding ► Engage legal counsel & review applicable laws ► Work closely with local client resources in country ► Know when to engage law enforcement ► Be careful! The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by
  • 20. Thank you! Now how about a little Q&A? Tim Stone Email: stonecreek2@att.net The Intelligence Collaborative is the online learning and networking community powered by Aurora WDC, our clients, partners and other friends and dedicated to exploring how to apply intelligence methods to solve realworld business problems. Apply for a free 30-day trial membership at http://IntelCollab.com or learn more about Aurora at http://AuroraWDC.com – see you next time! The Intelligence Collaborative http://IntelCollab.com #IntelCollab Powered by